Spelling suggestions: "subject:"countermeasures"" "subject:"eountermeasures""
1 |
New doppler and modulation phenomena in CW pulsed oscillatorsSomekh, M. G. January 1982 (has links)
No description available.
|
2 |
Tuning and noise performance of broadband voltage-controlled oscillatorsPerkins, M. January 1988 (has links)
No description available.
|
3 |
On countermeasures of worm attacks over the InternetYu, Wei 15 May 2009 (has links)
Worm attacks have always been considered dangerous threats to the Internet since they can
infect a large number of computers and consequently cause large-scale service disruptions and
damage. Thus, research on modeling worm attacks, and defenses against them, have become
vital to the field of computer and network security. This dissertation intends to systematically
study two classes of countermeasures against worm attacks, known as traffic-based
countermeasure and non-traffic based countermeasure. Traffic-based countermeasures are those
whose means are limited to monitoring, collecting, and analyzing the traffic generated by worm
attacks. Non-traffic based countermeasures do not have such limitations.
For the traffic-based countermeasures, we first consider the worm attack that adopts feedback
loop-control mechanisms which make its overall propagation traffic behavior similar to
background non-worm traffic and circumvent the detection. We also develop a novel spectrumbased
scheme to achieve highly effective detection performance against such attacks. We then
consider worm attacks that perform probing traffic in a stealthy manner to obtain the location infrastructure of a defense system and introduce an information-theoretic based framework to
obtain the limitations of such attacks and develop corresponding countermeasures.
For the non-traffic based countermeasures, we first consider new unseen worm attacks and
develop the countermeasure based on mining the dynamic signature of worm programs’ run-time
execution. We then consider a generic worm attack that dynamically changes its propagation
patterns and develops integrated countermeasures based on the attacker’s contradicted
objectives. Lastly, we consider the real-world system setting with multiple incoming worm
attacks that collaborate by sharing the history of their interactions with the defender and develop
a generic countermeasure based on establishing the defender’s reputation of toughness in its
repeated interactions with multiple incoming attackers to optimize the long-term defense
performance.
This dissertation research has broad impacts on Internet worm research since this work is
fundamental, practical and extensible. Our developed framework can be used by researchers to
understand key features of other forms of new worm attacks and develop countermeasures
against them.
|
4 |
A novel alert correlation and confidence fusion framework in intrusion detection systems /Yu, Dong, January 1900 (has links)
Thesis (Ph. D.)--University of Idaho, 2006. / Abstract. "May 2006." Includes bibliographical references (leaves 86-92). Also available online in PDF format.
|
5 |
Temporal, Spectral, and Spatial Treat Simulation Using a Towed Airborne Plume Simulator (TAPS)Taylor, Rick, Redmond, Neal, Balding, Jeff 10 1900 (has links)
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada / Efforts are underway to develop Infrared countermeasure (IRCM) systems to defend aircraft against IR guided surface-to-air (SAM) and air-to-air (AAM) missiles. One such system is the Large Aircraft Infrared Counter Measure (LAIRCM) which employs temporal, spatial, and spectral missile warning techniques. There is no current technique however, for installed system flight testing of such countermeasures in a realistic temporal, spatial, and spectral environment. This paper is an introduction to the Towed Airborne Plume Simulator (TAPS), a system designed to address this test shortfall. The TAPS operational concept is described as well as techniques for simulating missile signatures.
|
6 |
An automatic-repeat-request protocol for mobile radio data transmissionTurnkey, P. F. January 1980 (has links)
No description available.
|
7 |
Investigation of low-noise microwave receivers based on the theoretical analysis of local oscillator noise contributionEdgar, T. H. January 1980 (has links)
No description available.
|
8 |
Rule hashing for efficient packet classification in network intrusion detectionYoshioka, Atsushi, January 2007 (has links) (PDF)
Thesis (M.S. in computer science)--Washington State University, December 2007. / Includes bibliographical references (p. 44-45).
|
9 |
Power Analysis of the Advanced Encryption Standard : Attacks and Countermeasures for 8-bit MicrocontrollersFransson, Mattias January 2015 (has links)
The Advanced Encryption Standard is one of the most common encryption algorithms. It is highly resistant to mathematical and statistical attacks, however, this security is based on the assumption that an adversary cannot access the algorithm’s internal state during encryption or decryption. Power analysis is a type of side-channel analysis that exploit information leakage through the power consumption of physical realisations of cryptographic systems. Power analysis attacks capture intermediate results during AES execution, which combined with knowledge of the plaintext or the ciphertext can reveal key material. This thesis studies and compares simple power analysis, differential power analysis and template attacks using a cheap consumer oscilloscope against AES-128 implemented on an 8-bit microcontroller. Additionally, the shuffling and masking countermeasures are evaluated in terms of security and performance. The thesis also presents a practical approach to template building and device characterisation. The results show that attacking a naive implementation with differential power analysis requires little effort, both in preparation and computation time. Template attacks require the least amount of measurements but requires significant preparation. Simple power analysis by itself cannot break the key but proves helpful in simplifying the other attacks. It is found that shuffling significantly increases the number of traces required to break the key while masking forces the attacker to use higher-order techniques.
|
10 |
An investigation of simultaneous fade dynamics and radiometry in a 40 GHz satellite down linkCatalan, Carlos Catalan January 2000 (has links)
No description available.
|
Page generated in 0.0692 seconds